5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The first day of Pwn2Own Automotive 2026 featured 30 entries targeting various automotive systems, resulting in $516,500 awarded for 37 unique 0-days. Notable successes included Fuzzware.io and Team DDOS, while several teams failed to complete their exploits in time.
If you do, here's more
Pwn2Own Automotive 2026 kicked off with 30 entries targeting various automotive systems. The event awarded a total of $516,500 for 37 unique zero-day exploits on Day One. Fuzzware.io currently leads the competition for Master of Pwn, with Team DDOS close behind. The excitement is palpable, as researchers showcase their ability to exploit vulnerabilities in modern vehicles.
Several teams achieved notable successes. Neodyme AG earned $20,000 for exploiting a stack-based buffer overflow on the Alpine iLX-F511. Fuzzware.io made headlines by chaining two vulnerabilities to manipulate the Autel charger, securing a $50,000 prize. Team DDOS exploited command injection vulnerabilities against the ChargePoint Home Flex, earning $40,000. The competition is fierce, with multiple teams hitting collisions, where their exploits overlap, leading to shared points and prizes.
Failures also marked the event. Team Hacking Group couldn't complete their exploit against the Kenwood DNR1007XR, and several others faced similar challenges with different targets. Despite these setbacks, the day highlighted the ongoing battle between automotive security researchers and the vulnerabilities in vehicle systems. The next day's results are eagerly anticipated, as more teams prepare to push the limits of automotive technology security.
Questions about this article
No questions yet.